IT Information Security Classroom Style Video Libraries

License only becomes active after first login so feel free to buy now and activate later

The IT Security video training library provides students the capability to certify at multiple levels (CISSP, Security+, CISA, CISM etc.) within the IT Security domain plus acquire the knowledge and skills to become a thought leader on both sides of the IT Security spectrum (planning & operations). This unique approach to training enables students to certify across multiple IT Security domains at a price point equal to or better than the price of one classroom program. Bundle license begins upon login to the first program. Classes include:

Licensing Options

Individual Library License

Student has access to all ITIL classes for the term of the license. Library license timer begins at first login.

180 Day License $1,395

360 Day License $1,995

30 Day License Extension $195

Team Library License

The multi-student shared library enables each team member (max 6) to select any 2 classes from the purchased library. In the case of the multi-student shared library each class will have a 30 or 60 day license which will begin at first login for each course.

Team License 30 – $1,995

Team License 60 – $2,595

30 Day License Extension $195

IT Security Class Outlines

CompTIA: Security+ Certification Training

The CompTIA Security+ (SY0-301) certification establishes knowledgeable professionals in the field of corporate security, one of the fastest-growing fields in IT. Even in a troubled economy, most businesses plan to at least maintain or optimally increase their investment in IT security. CompTIA Security+ is an international, vendor-neutral certification that demonstrates competency in network infrastructure, system security, organizational security and access control. Major organizations that enlist CompTIA Security+ certified professionals include Hewlett- Packard, IBM, Motorola, Hilton Hotels Corp., General Mills, Symantec, Lockheed Martin, Unisys, Hitachi, Ricoh, the U.S. Navy, Army, Air Force and Marines.

Although not a prerequisite, it is recommended that CompTIA Security+ candidates have at least two years of technical networking experience, with an emphasis on security. The CompTIA Network+ certification is also recommended.

Each online video class comes with the following features to prepare you for the exams listed below:

Instructor lectures in a video classroom environment

Hands-on Lab Simulations

Printable Courseware

Measure Up Exam Simulator

24×7 Learning Zone Live Mentor Support

EC-Council: Security 5 Certification Training

Our Expert Trainer: Kenneth Mayer – CCSI, MCT, CCNT, CCNP, CCDA

Download the course outlineTest Drive our training programs.
The Security 5 is an entry level professional certification for individuals interested in learning computer networking and security basics. This certification program insures a person’s competency in basic security matters, such as the definitions and the safe implementation of Firewall’s, ports, and Anti-virus software.

This officially endorsed product provides students not only with the training but a voucher number as well that can be used to schedule and pay for the exam at any Prometric testing center. The cost of the exam is not included in this package.

Each online video class comes with the following features to prepare you for the exams listed below:

Instructor lectures in a video classroom environment

24×7 Learning Zone Live Mentor Support

Students also have the option to purchase the EC Council Security5 Course Book and CD. Please contact sales@itsmsolutions.com for more information.

EC-Council: Certified Ethical Hacker v8 Certification Training

This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student completes the course they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam.

This officially endorsed product provides students not only with the training but also an authorization code that can be used to schedule and pay for the exam at any Prometric testing center,

Each online video class comes with the following features to prepare you for the exams listed below:

Instructor lectures in a video classroom environment

Over 190 CEH Exam Review Questions

24×7 Learning Zone Live Mentor Support

Students also have the option to purchase the EC-Council CEH v8 Courseware Kit (listed below). Please contact sales@itsmsolutions.com for more information.

EC-Council: Certified Ethical Hacker v7 Certification Training

This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student completes the course they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50

This officially endorsed product provides students not only with the training but also an authorization code that can be used to schedule and pay for the exam at any Prometric testing center,

Each online video class comes with the following features to prepare you for the exams listed below:

Instructor lectures in a video classroom environment

Over 190 CEH Exam Review Questions

24×7 Learning Zone Live Mentor Support

Students also have the option to purchase the EC-Council CEH v7.1 Courseware Kit (listed below). Please contact sales@itsmsolutions.com for more information.

A 5 DVD Media Pack containing over 300 of the latest Hacking Tools and Exploits

Computer hacking forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. CHFI investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information. This course will prepare you to pass the EC0 312-49 exam and achieve Computer Hacking Forensics Investigator (CHFI) certification.

This officially endorsed product provides students not only with the training but also an authorization code that can be used to schedule and pay for the exam at any Prometric testing center.

Each online video class comes with the following features to prepare you for the exams listed below:

Instructor lectures in a video classroom environment

24×7 Learning Zone Live Mentor Support

Students also have the option to purchase the Official EC-Council CHFI Courseware Kit (see below). Please contact sales@itsmsolutions.com for more information.

The ECSA/LPT training program is a highly interactive security course designed to teach Security Professionals the advanced uses of the available methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the LPT methodology and ground breaking techniques for security and penetration testing, this course will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the course providing complete coverage of analysis and network security-testing topics. This course will prepare you to pass exam 412-79 to achieve EC-Council Certified Security Analyst (ECSA) certification This officially endorsed product provides students not only with the training but also an authorization code that can be used to schedule and pay for the exam at any Prometric testing center,

Each online video class comes with the following features to prepare you for the exams listed below:

Instructor lectures in a video classroom environment

24×7 Learning Zone Live Mentor Support

Students also have the option to purchase the Official EC-Council ECSA/LPT Courseware Kit (see below). Please contact sales@itsmsolutions.com for more information.

EC-Council: Network Security Administrator Certification Training

This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them. This course prepares you for EC-Council Network Security Administrator exam 312-38. This course is a prerequisite for the CEH program.

This officially endorsed product provides students not only with the training but also an authorization code that can be used to schedule and pay for the exam at any Prometric testing center,

Each online video class comes with the following features to prepare you for the exams listed below:

Instructor lectures in a video classroom environment

24×7 Learning Zone Live Mentor Support

Students also have the option to purchase the EC-Council Courseware Kit (see below). Please contact sales@itsmsolutions.com for more information.

SCP: Security Awareness Training

Our Expert Trainer: Warren Peterson

Download the course outlineTest Drive our training programs.
The Security Awareness course series is designed to give all information professionals the knowledge and tools to protect themselves and the sensitive information they use from security attacks. It covers many simple ways to prevent security breaches and protect valuable data.

Each online video class comes with the following features to prepare you for the exams listed below:

The 6-day SSCP course provides comprehensive training in all 10 domains of the Common Body of Knowledge (CBK). The curriculum has been designed to meet a strict set of criteria covering all critical elements necessary for security today. It is aimed at professionals with at least four years of experience in the information security field or three years of experience and a college degree (or equivalent life experience).The SSCP certification is seen as a requirement for many technical and management positions.

The Shon Harris SSCP course teaches security policy development, secure software development procedures, network vulnerabilities, attack types and corresponding countermeasures, cryptography concepts and their uses, disaster recovery plans and procedures, risk analysis, crucial laws and regulations, forensics, computer crime investigation procedures, physical security, and more. Further, students will explore the contents and concepts that make up the diverse domains and learn how they work together to provide true in-depth defense.

Each online video class comes with the following features to prepare you for the exams listed below:

The Shon Harris CISSP Series brings together all the materials, tools, and study aids you need to pass the CISSP exam. Whether you are a security professional, a seasoned engineer, or are looking for a career change – this is the solution to bring your career to new heights! Our objective is to not just prepare you for CISSP Certification, but to also provide you with the practical, detailed understanding and knowledge of security topics that will be of valued use to you and your company. Our product focuses not only on the areas necessary for the CISSP examination, but also on a more detailed and practical perspective that will give you competitive skills in the real world as well.

Our superior technology based course curriculum, strictly adheres to all of (ISC)2 & CompTIA Security+ exam objectives and is presented to you by leading certification instructors who are concise and engaging in their delivery. You will learn both the theory and practical aspects of the technologies as well as gain insight into the industry with their expert instruction. Each class session is presented in full motion audio/video, with step by step demonstrations testing modules to insure that you fully understand the subject matter. You can review each subject as needed to reinforce your knowledge, and access to educational mentors.

Each online video class comes with the following features to prepare you for the exams listed below:

ISACA: Certified Information Systems Auditor Certification Training

Since 1978, the Certified Information Systems Auditor (CISA) program, sponsored by the Information Systems Audit and Control Association® (ISACA®), has been the globally accepted standard among information systems (IS) audit, control, and security professionals.

Our CISA Certified Information Systems Auditor course provides the student with the knowledge and proficiency to prepare for the globally recognized CISA 2011 certification exam. The CISA certification has become very popular since it originated in 1978, and is a benchmark for IS audit, security, control, and assurance personnel to validate their skill set. This course will immerse the student into the subject, with in-depth coverage of the information covering the five domains that make up the “Body of Knowledge” for the CISA 2011 exam and will provide the student the tools to build their technical skills to develop, manage, and perform IT security audits.

Each online video class comes with the following features to prepare you for the exams listed below:

Instructor lectures in a video classroom environment

Printable Study Guide

24×7 Learning Zone Live Mentor Support

ISACA: Certified Information Security Manager Certification Training

The CISM certification program is developed specifically for experienced information security managers and those who have information security management responsibilities. CISM is globally recognized as the leading credential for information security managers.

Our CISM Certified Information Security Manager course provides the student with the knowledge and proficiency to prepare for the globally recognized CISM 2011 certification exam. The CISM certification combines the achievement of passing a comprehensive exam with recognition of work, management and educational experience, providing you with greater credibility in the marketplace. This course will immerse the student into the subject, with in-depth coverage of the information covering the five domains that make up the “Body of Knowledge” for the CISM 2011 exam and will provide the student the tools to build their technical skills to manage, design, oversee and assess an enterprise’s information security.

Each online video class comes with the following features to prepare you for the exams listed below:

Instructor lectures in a video classroom environment

Printable Study Guide

24×7 Learning Zone Live Mentor Support

ITIL® Foundation Certification with Resource Guide

This CSME/Peoplecert accredited training program is targeted at IT and business professionals looking to become Foundation certified in the basics of ITIL and ITSM. Candidates can expect to gain knowledge and understanding in the following upon successful completion of the education and examination components related to this certification.

Service Management as a practice (Comprehension)

Service Lifecycle (Comprehension)

Key Principles and Models (Comprehension)

Generic Concepts (Awareness)

Selected Processes (Awareness)

Selected Roles (Awareness)

Selected Functions (Awareness)

Technology and Architecture (Awareness)

ITIL Qualification scheme (Awareness)

Video Training Features

8 hours of instructor led video presentations,

Printable online student workbook & detailed resource guide

Detailed Video Training Guide

Membership in our support community – My itSM Mentoring Community™.

Exam Options

The exam can be taken online using a webcam proctor, at a testing center, or onsite with an accredited proctor. Certification is through CSME or APMG. Student must pass a 60 minute, 40 question closed book multiple choice, examination with a passing score of 65% in order to receive this certification.

Credits Earned

2 ITIL Expert Credits

18 PDU Credits

ITIL® Capability – Service Offerings & Agreements (SOA)

This CSME/Peoplecert accredited training program is for individuals seeking specialist certification in ITIL’s Service Offerings & Agreements practice area. Candidates for this program include implementation and operation specialist who hold a Foundation certificate. Candidates will gain competencies in the following areas upon successful completion of the reading (Service Strategy & Service Design Books), training and examination components related to this certification.

Overview of SOA processes and basic principles

The value to the business of SOA activities

How the SOA processes rely on a good business case

How the SOA processes rely on an understanding of return on investment (ROI)

Processes across the service lifecycle pertaining to the service offerings and agreements curriculum:

Service portfolio management, which provides documentation for services and prospective services in business terms

Service catalogue management, which is concerned with the production and documentation of the service catalogue from a business and a technical viewpoint

Service level management, which sets up a service level agreement (SLA) structure and ensures that all SLAs have an underpinning support structure in place

Demand management, which identifies patterns of business activity to enable the appropriate strategy to be implemented

Supplier management, which ensures all partners and suppliers are managed in the appropriate way and includes contract management

Financial management for IT services, which includes ensuring understanding of the service value and the management of all financial considerations

Business relationship management, which ensures the customerâ€™s requirements are correctly identified

SOA roles and responsibilities

Technology and implementation considerations

Challenges, critical success factors and risks.

Video Training Features

5 hours of instructor led video presentations,

Printable online student workbook

Detailed Video Training Guide

Membership in our support community – My itSM Mentoring Community™.

Exam Options

The exam can be taken online using a webcam proctor, at a testing center, or onsite with an accredited proctor. Certification is through CSME or APMG. Student must pass a 90 minute, 8 question closed book multiple choice, scenario-based, gradient scored examination with a passing score of 70% in order to receive this certification. Students must present an ITIL Foundation or V2 Foundation plus Bridge Certificate prior to sitting for the exam.

Credits Earned

4 ITIL Expert Credits

38 PDU Credits

ITIL® Capability – Planning Protection & Optimization (PPO)

This CSME/Peoplecert accredited training program is for individuals seeking specialist certification in ITIL’s Planning, Protection & Optimization practice area. Candidates for this program include implementation and operation specialist who hold a Foundation certificate. Candidates will gain competencies in the following areas upon successful completion of the reading (Service Strategy & Service Design Books), training and examination components related to this certification.

Service design in PPO and lifecycle context

Processes across the service lifecycle pertaining to the practice elements within planning, protection and optimization

Capacity management as a capability to realize successful service design

Availability management as a capability to realize successful service design

IT service continuity management as a capability to support overall business continuity management

Information security management as part of the overall corporate governance framework

Planning, protection and optimization roles and responsibilities

Technology and implementation considerations

Organizational roles relevant to PPO.

Video Training Features

7 hours of instructor led video presentations,

Printable online student workbook

Detailed Video Training Guide

Membership in our support community – My itSM Mentoring Community™.

Exam Options

The exam can be taken online using a webcam proctor, at a testing center, or onsite with an accredited proctor. Certification is through CSME or APMG. Student must pass a 90 minute, 8 question closed book multiple choice, scenario-based, gradient scored examination with a passing score of 70% in order to receive this certification. Students must present an ITIL Foundation or V2 Foundation plus Bridge Certificate prior to sitting for the exam.

Credits Earned

4 ITIL Expert Credits

38 PDU Credits

Our Expert Trainers

Instructor: Kenneth Mayer – CCSI, MCT, CCNT, CCNP, CCDA

Ken Mayer is a Microsoft Certified Trainer as well as a Certified Ethical Hacker Trainer and Security consultant. He started his career in computer technology in 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies across the United States and Western Europe. He has achieved the Certified Cisco Systems Instructor certification. The CCSI certification involved a two-day lab and observation event held on Cisco’s Paris, France Facility. This gave Ken the accreditation to be able to deliver Cisco Authorized Courses as a CCSI. He has taught the full line of Cisco CCNA, CCDA, CCNP, CCDP and CCIP course curriculums, including Cisco’s security appliances such as PIX and IDS.

Eric Reed brings more than a decade of IT experience to his expert video instruction. Eric specializes in network penetration testing and digital forensics consultation for large corporations and government sectors. After working for many years in the IT security and training industry as an independent consultant, Eric became co-owner of Immersion Training, LLC. He is currently solely focused on advanced security consulting and education. Eric is an EC-Council Master Certified Instructor and a Microsoft Certified Trainer. His experience in the public / defense sectors is equally complemented by assignments undertaken for heavyweight world renowned corporations including Yahoo, Xerox, AT&T and Texas Instruments to name but a few. He is imminently qualified in his field in that he holds a string of professional qualifications in Networking to name a few (MCT, MCSE, Cisco, Network+) and IT Security (CIW Security Analyst , Security+, CEI, CEH, CPTE, CDFI, CPTM) besides a bachelor’s degree in science.

Robert Reed – CHFI, Certified EC-Council Instructor (CEI)
Robert Reed is a seasoned investigator and trainer with twenty years of law enforcement experience. With a Masters in Science in computer information systems he has leveraged this knowledge into the computer forensics field developing and operating the firstASCLDD (American Society of Crime Lab Directors) Lab accredited computer forensic program in the State of Arizona. He has obtained multiple certifications including the EC Council Computer Hacking Forensic Investigator (CHFI) and is a Certified EC Council Instructor (CEI). Reed has taught computer forensics and cyber crime programs to clients from the US and foreign governments. Students include military personnel, law enforcement officials from national, state and local governments, educational institutions, corporate clients and Individuals.

Wayne Burke – CEH, EC-Council Master Certified Instructor

Wayne Burke, Founder and CIO of SecureIA, is a captain of a global operating
group of penetration testers and security experts. Wayne and his group have
delivered assignments and customized training for Law Enforcement, Police,
various Military Units, NSA, FBI, EPA and similar government bodies from South America, Africa, Philippines, Singapore, Malaysia and numerous Gulf locations to name a few from around the world. His office has become his next 12 hour international flight. In Europe he works for numerous government agencies,
corporate institutes and the military. Wayne is the creator of many popular security training tracks and has built the Certified Penetration Testing™ series. Wayne has had considerable IT Security experience in the fields of: Penetration Testing aka Ethical Hacking, Digital Forensics and Wireless Technologies. His experience in the public / defense sectors is equally complemented by assignments undertaken for heavyweight world renowned corporations including Yahoo, Xerox, AT&T and Texas Instruments to name but a few. He is imminently qualified in his field in that he holds a string of professional qualifications in Networking to name a few (MCT, MCSE, Cisco, Network+) and IT Security (CIW Security Analyst , Security+, CEI, CEH, CPTE, CDFI, CPTM) besides
a bachelor’s degree in science.

Warren Peterson

Warren Peterson is the President, and co-founder of the Security Certified Program (SCP). In addition to his role as President, Warren also functions as the lead author for instructional content, and has written nine leading IT security books, including all current SCP courses.In 1999, it was Warren’s vision to create a program that addressed IT security, and the SCP was born. Warren has overseen the company’s growth from delivering security programs in one Chicago classroom to SCP courses delivered on a global scale.

Shon Harris – CISSP, MCSE

Shon Harris CISSP, MCSE, is a security consultant, a former engineer in the Air Force Information Warfare Unit, an instructor, an author, and President of Logical Security. She has written two best selling CISSP books, and co-authored Hacker’s Challenge and Gray Hat Hacking. Shon has developed a new security book series, being published by McGraw-Hill, which will be sold to corporations, universities, colleges, and professionals throughout the world. This series will set the new standards in security training, education, and industry practices. She is an active contributor for Information Security Magazine and Windows 2000 Magazine. Shon has taught computer and information security to a wide range of clients including RSA, Department of Defense, Department of Energy, National Security Agency (NSA), Bank of America, Defense Information Systems Agency (DISA), BMC, and more. Shon was recently recognized by Information Security Magazine as one of the top 25 women technologists, researchers and executives reshaping information security today.

Patrick Von Schlag – ITIL Expert

Patrick has worked in the Information Technology field for over 25 years and brings his extensive expertise to our courses. He has helped establish IT service management programs for a variety of organizations including pharmaceutical, energy, and software companies. Patrick was a part of one of the original service management teams in the United States. He has been a member of several CompTIA boards and is a member of the ITSM forum.

VK

Facebook

Twitter

Google+

Pinterest

LinkedIn

E-mail

Our Contacts

Entire Contents itSM Solutions® LLC. All Rights Reserved.
[ITIL® PRINCE2® RESILIA™ is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved. The Swirl logo™ is a trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved
The APMG-International ISO/IEC 20000 and Swirl Device logo is a trade mark of The APM Group Limited.
COBIT® is a registered trademark of ISACA® registered in the United States and other countries